CYBERCRIME

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
Across
  1. 3. any non-public transmission of computer data to from or within a computer system intercepted by technical means without permission including electromagnetic emissions from a computer system containing such computer data.
  2. 6. it is one computer is used to reprogram another for illicit purposes.
  3. 7. pieces of computer code that can infect computer system causing disruptions to their normal operation.Cyber-trespass- it is the crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
  4. 8. property that takes the form of ideas expressions sign symbols designs logos and similar intangible forms.
  5. 9. the crime that occurs when individuals make securities recommendations and fail to disclose that they are being paid to disseminate their favorable opinions.
  6. 11. group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network modes.
  7. 12. the act of copying digital material posted online into the storage medium on one’s computer.
  8. 13. the most sensitive component as prevention from cybercrime.
  9. 14. these can be used to store copies of files from the computer for use in his investigation.
  10. 16. an unauthorized person uses the identity of an unauthorized computer user to access the computer system.
  11. 17. a generally derogatory term used to describe activities associated with hacking in its second sense that of unauthorized access to computer systems.
  12. 20. the systematic observation and monitoring of people and places as a tool for effecting greater control over behavior.
  13. 21. repeated harassing or threatening behavior in which an offender persistently contracts follows approaches threatens or otherwise subjects a victim to unwelcome attentions.
  14. 26. market economic activity undertaken via the internet or similar electronic communication networks.
  15. 27. any illegal action that occurs within or via the use of electronic communication networks such as the Internet.
  16. 28. it is generally implemented using firewalls which provide a centralized point from which to permit or allow to access.
  17. 31. it is a negative information is spread online about a stock driving down its price and enabling people to buy it at an artificially low price before rebuttals by the company’s officers reinflate the price.
  18. 33. a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
  19. 36. the right to be left alone freedom from observation and interference from others.
  20. 38. it is a crossing boundaries into other people’s property and/or causing damage eg hacking defacement viruses.
  21. 39. the fraudulent practice of sending emails to individuals that purport to come from legitimate Internet retailer or financial service.
  22. 40. it should be charged with regular interval of time and it should be alpha numeric and should be difficult to judge.
  23. 41. criminal acts that tend to go largely unobserved unremarked and unrecorded in official assessments and measures of criminal activity.
  24. 44. an illegally obtains data from a computer system by leaking it out in small amounts.
  25. 45. the fraudulent practice of establishing facsimiles or legitimate websites to which victims can be directed and where they will unknowingly surrender sensitive information such as bank details credit card numbers and account passwords.
  26. 46. unauthorized copying distribution or sale of informational commodities over which some party claims property rights is referred to as copyright violations.
  27. 47. unauthorized access to, and interference with a computer system the illicit and typically illegal acts associated with unauthorized access to and interference with a computer system.
  28. 48. an act emending certain provisions of republic act no. 8293
Down
  1. 1. unauthorized access to the entire or any part of a computer system.
  2. 2. a stage of socio-economic development in which the importance previously allocated to the production of material goods and resources is superseded by the centrality of knowledge and information in economic activity.
  3. 4. sexually explicit visual or written representations whose primary goal or usage is to generate sexual excitement.
  4. 5. most computer programs used in business have built-in anti-theft safeguards.
  5. 8. It occurs when a person uses the Internet to steal someone’s identity and/or impersonate them to open a new credit card account or conduct some other financial transaction.
  6. 10. an investment scheme in which investors are promised abnormally high profits on their investments.
  7. 15. an interactive technologies that allow the creation or sharing/exchange of information ideas career interests and other forms of expression via virtual communities and networks.
  8. 18. a general term for a variety of computer codes ( such as viruses, logic bombs, and Trojan horses) which are designed to disrupt or interfere with a computer’s normal operation.
  9. 19. it is the surveillance that focuses not upon the visual or other tracking of the physical individual but of collecting, collating and analyzing data about the individual’s activity often in the form of electronic records.
  10. 22. an offering that uses false or fraudulent claims to solicit investments or loans or that provides for the purchase, use, or trade of forged or counterfeit securities.
  11. 23. a global computer network providing a variety of information and communication facilities consisting of interconnected networks using standardized communication protocols.
  12. 24. a program is secretly attached to the company’s computer system.
  13. 25. the interactional space or environment created by linking computers together into a communication network.
  14. 29. terrorist activity that targets computer networks and information systems for attack.
  15. 30. an act providing for the recognition and electronic commercial and non-commercial transactions and documents, penalties for the unlawful use thereof, and for other purposes.
  16. 31. it is doing psychological harm to, or inciting physical harm against others thereby breaching laws relating to the protection of the person eg hate speech stalking.
  17. 32. A techniques and tools for encoding or scrambling data in such a way that it is incomprehensible to those who do not have access to the key required to decode the data back into its original legible form.
  18. 34. an act regulating the issuance and use of access device prohibiting fraudulent acts committed relative thereto providing penalties and other purposes.
  19. 35. an act defining cybercrime providing for the prevention investigation supression and the imposition of penalties therefor and for other purposes.
  20. 37. stalking that takes place via online communication mechanism such as email chat rooms instant messaging and discussion lists.
  21. 42. an act prescribing the intellectual property code and establishing the intellectual property office providing for its powers and fuctions and other purposes.
  22. 43. political activism and social protest that uses hacking tools and techniques.